Chapter 5 security Plus

12345678910111213141516171819202122232425
Across
  1. 6. A request that has been fabricated
  2. 7. takes advantage of a vulnerability to move to restricted directories
  3. 8. store data in RAM beyond the boundaries
  4. 9. An attack in which a website accepts user input without validating it
  5. 10. hides its presence on the device
  6. 12. A sign an attack is currently underway
  7. 13. A malicious program that uses a computer network to replicate
  8. 14. move from the root directory to other restricted directories
  9. 16. An attack that copies data and then uses it
  10. 18. account that is inaccessible through a normal login attempt
  11. 20. Malware that replicates by infecting other files or programs
  12. 22. An indicator of attack in which data is no longer accessible
  13. 23. An attack in which threat actors introduce something into RAM
  14. 24. Closing unused ports and disabling unnecessary protocols
  15. 25. inserts statements to manipulate a database server
Down
  1. 1. depletion of memory or processing capabilities
  2. 2. resource that is not possible due to geography
  3. 3. It only goes off after certain conditions are met
  4. 4. threat actor gains illicit access of elevated rights or privileges
  5. 5. Software installed on a device without the user requesting it
  6. 11. Malware disguised as something useful or legitimate
  7. 15. A cookie that is only sent to the server with an encrypted request
  8. 17. Installing software security updates
  9. 19. captures and stores each keystroke that a user types on the computer’s keyboard
  10. 21. Secure space for running untrusted software
  11. 24. monitors endpoints and immediately blocks a malicious attack